Trojan (Generic)

Threat description

Details

CATEGORYMalware
TYPETrojan

Summary

A Generic Detection of a file or program that appears to have trojan-like features or behavior.

Removal

Automatic action

Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.

If you suspect that a file contains harmful code, or that a program is performing harmful actions, you can send a sample of it to F-Secure Labs for analysis:

You may also refer to the following articles for more information:

Or Contact Support for further assistance.

Security programs will sometimes unintentionally identify a clean program or file as malicious if its code or behavior is similar to a known harmful program or file. This is known as a False Alarm or False Positive (FP).

For example, 'tmp.edb' and other '.edb' files stored at the location 'C:\WINDOWS\SoftwareDistribution\DataStore\Logs\' may be unintentionally detected as malicious by various security programs.

Checking for a fix

In most cases, a False Positive is fixed in a subsequent database release; updating your F-Secure security product to use the latest database is enough to resolve the issue. If you suspect a detected file may be a False Positive, you can check by first updating your F-Secure security product to use the latest detection database updates, then rescanning the suspect file.

Send a sample to F-Secure Labs

After checking, if you believe the file or program is still incorrectly detected, you can submit a sample of it to F-Secure Labs for analysis and correction:

Exclude a known safe file from further scanning

If you are positive that the suspect file is safe and you want to continue using it, you can exclude it from further scanning by the F-Secure security product:

You may also refer to the Knowledge Base on the F-Secure Community site for more assistance.

Also

Microsoft provides enterprise-level instructions for excluding files from scanning by antivirus software:

More scanning & removal options

More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.

You may also refer to the Knowledge Base on the F-Secure Community site for more assistance.

Contact Support

F-Secure customers may request support online via the Request support or the Chat forms on our Home - Global site.

Technical Details

A trojan that is identified by a detection using the format 'trojan.generic.[variant]', 'trojan.gen.[variant]' or similar indicates that the program was identified by a Generic Detection.

Named after the Trojan Horse of Greek legend, a trojan is a program that performs, or appears to perform, one function, but in reality executes another action without the user's knowledge or consent.

Usally, a trojan program will either have (or pretend to have) a functionality that offers a useful service to the user - for example, a screensaver, a service pack or application update and so on - to encourage the user to install the program.

Some trojans may use similar or even identical styles, colors and designs as those of legitimate programs, to further deceive the user.

Once installed, the trojan performs its actual, unauthorized function, which can range from mildly annoying pranks (like changing desktop icon positions), to serious, user-inhibiting functions (like disabling the keyboard or mouse) to critically destructive actions (like erasing files or stealing data).

Submit a Sample

Suspect a file or URL was wrongly detected? Send it to our Labs for further analysis

Submit a Sample

Scan & Clean Your PC

F-Secure Online Scanner will scan and clean your PC in just a few minutes for free

More Info